0% found this document useful (0 votes)
3 views

COMPUTER NETWORKING

The document provides an overview of computer networks, including definitions, advantages, types of networks, protocols, and security measures. It covers key concepts such as network topologies, devices, communication media, and the OSI model. Additionally, it discusses cloud computing, internet services, and cybersecurity threats and prevention methods.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

COMPUTER NETWORKING

The document provides an overview of computer networks, including definitions, advantages, types of networks, protocols, and security measures. It covers key concepts such as network topologies, devices, communication media, and the OSI model. Additionally, it discusses cloud computing, internet services, and cybersecurity threats and prevention methods.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

1|Page

COMPUTER NETWORKS – I :-
1. Basic Concepts of Computer Networks
Q1: What is a computer network? Explain its advantages.

A computer network is a collection of interconnected computers and devices that


communicate with each other to share resources, data, and applications.

Advantages of Computer Networks:

1. Resource Sharing – Devices like printers, scanners, and storage can be shared.
2. Data Sharing – Users can exchange files and information easily.
3. Communication – Email, video conferencing, and instant messaging enhance
communication.
4. Cost-Effective – Reduces hardware and software costs by sharing resources.
5. Centralized Data Management – Data is stored on a central server, reducing
redundancy.

Q3: What is the difference between a wired and a wireless network?

 Wired Network – Uses physical cables (Ethernet) for connectivity. More secure and
faster.
 Wireless Network – Uses radio waves (Wi-Fi) to transmit data. Offers mobility and
convenience.

Q4: Define network protocol. Give examples.

A network protocol is a set of rules that govern data communication over a network.
Examples: HTTP, TCP/IP, FTP, SMTP, UDP
2|Page

2. Network Topologies
Q5: Explain bus, star, ring, and mesh topologies with diagrams.

1. Bus Topology – Single backbone cable. Data travels in both directions.


2. Star Topology – Central hub/switch connects all devices. Most commonly used.
3. Ring Topology – Each device is connected to two others in a circular layout.
4. Mesh Topology – Each device is directly connected to multiple others. Very reliable.

Most Reliable: Mesh Topology – Because it has multiple paths for data transmission.

3. Network Devices
Q6: Functions of network devices

1. Hub – Broadcasts data to all devices in a network.


2. Switch – Directs data only to the intended device, improving efficiency.
3. Router – Connects different networks and manages data traffic.
4. Modem – Converts digital signals to analog and vice versa for internet access.
5. Gateway – Acts as a bridge between two different networks.

Hub vs Switch: A hub sends data to all devices, while a switch sends data only to the
intended recipient.

4. Types of Communication & Transmission Media


Q7: What are guided and unguided transmission media?

 Guided Media – Uses cables (e.g., twisted pair, coaxial, fiber optic).
 Unguided Media – Uses wireless signals (e.g., radio waves, microwaves, infrared).

Q9: What are radio waves, microwaves, and infrared signals? Where are they
used?
3|Page

 Radio Waves – Used in AM/FM radios, Wi-Fi.


 Microwaves – Used in satellite communication, mobile networks.
 Infrared – Used in remote controls, short-range data transfer.

Q11: What is a MAC address? How is it different from an IP address?

 MAC Address – A unique hardware address of a device. Assigned by the


manufacturer.
 IP Address – A logical address assigned for communication over a network.

Q12: Explain HTTP, HTTPS, FTP, SMTP, and TCP/IP protocols.

1. HTTP (HyperText Transfer Protocol) – Used for web browsing.


2. HTTPS (Secure HTTP) – Encrypted HTTP, used for secure transactions.
3. FTP (File Transfer Protocol) – Used to transfer files over a network.
4. SMTP (Simple Mail Transfer Protocol) – Used for sending emails.
5. TCP/IP (Transmission Control Protocol/Internet Protocol) – Used for data
transmission over the internet.

Q13: Difference between TCP and UDP?

 TCP (Transmission Control Protocol) – Reliable, error-checked (used in emails,


web browsing).
 UDP (User Datagram Protocol) – Faster but unreliable (used in live streaming,
gaming).

6. Network Security
Q14: What is a firewall? How does it help in network security?
4|Page

A firewall is a security system that monitors and controls network traffic.


Uses:

 Blocks unauthorized access


 Protects data from cyber threats
 Prevents viruses and malware

Q15: Explain encryption and decryption in cybersecurity.

 Encryption – Converts data into unreadable format to secure it.


 Decryption – Converts encrypted data back into readable format.

7. Cloud Computing & Internet Services


Q17: What is cloud computing? Explain its advantages and disadvantages.

Cloud computing provides services (storage, software, processing) over the internet.

Advantages:
✔ No hardware cost
✔ Scalable and flexible
✔ Accessible from anywhere

Disadvantages:
✖ Internet dependency
✖ Security risks

Q19: What is the difference between HTTP and HTTPS?


5|Page

 HTTP – No encryption, used for general browsing.


 HTTPS – Secure (SSL/TLS encryption), used for banking, shopping.

COMPUTER NETWORKS – II :-

Q2: Explain the OSI Model and its layers.

The OSI (Open Systems Interconnection) Model is a conceptual framework that


standardizes network communication in 7 layers:

1. Physical Layer – Transmits raw bits (cables, signals).


2. Data Link Layer – Handles error detection (MAC address, switches).
3. Network Layer – Manages IP addressing & routing (IP address, routers).
4. Transport Layer – Ensures reliable data transfer (TCP, UDP).
5. Session Layer – Manages sessions & connections (logins, authentication).
6. Presentation Layer – Data encryption & compression (SSL, ASCII).
7. Application Layer – User interaction (Web browsers, email).

2. Internet Protocols & Communication


Q4: What is the role of DNS in networking?
6|Page

DNS (Domain Name System) translates domain names (e.g., google.com) into IP addresses
(e.g., 142.250.180.14) for easier browsing.

Example:

 User enters www.facebook.com


 DNS converts it into an IP address and directs the browser to the website.

Q5: What are static and dynamic IP addresses?

 Static IP – Fixed, manually assigned, used for web servers.


 Dynamic IP – Assigned by DHCP (Dynamic Host Configuration Protocol),
changes over time.

Q6: What is VoIP? Mention its advantages.

VoIP (Voice over Internet Protocol) enables voice calls over the Internet (e.g., WhatsApp
calls, Zoom, Skype).

Advantages:
✔ Cheaper than traditional calls
✔ Works over Wi-Fi or mobile data
✔ Supports video calling

3. Network Security & Cyber Threats


Q7: What is a proxy server? How does it enhance security?

A proxy server acts as an intermediary between a user and the internet.

Security Benefits:
✔ Hides user’s IP address
✔ Filters malicious websites
✔ Increases browsing speed by caching data

Q8: What is phishing? How can it be prevented?

Phishing is a cyber attack where attackers send fake emails or websites to steal user
credentials.
7|Page

Prevention Methods:
✔ Avoid clicking on unknown links
✔ Use spam filters
✔ Enable two-factor authentication

Q11: What is a VPN? What are its advantages?

A VPN (Virtual Private Network) encrypts internet traffic, providing security and
anonymity.

Advantages:
✔ Protects online privacy
✔ Allows access to restricted content
✔ Prevents hacking over public Wi-Fi

Q12: What are the key features of 5G technology?

 Higher Speed – 10x faster than 4G


 Low Latency – Near real-time communication
 Better Connectivity – Supports IoT, smart cities

Q13: What is cloud storage? Name two cloud storage providers.


8|Page

Cloud storage allows users to store data on remote servers accessible via the internet.

Examples:

1. Google Drive
2. Dropbox

Q14: What is data redundancy? How does cloud computing handle it?

Data redundancy occurs when the same data is stored in multiple places. Cloud computing
manages redundancy by using backup servers and replication techniques to prevent data
loss.

You might also like